


Остановите войну!
for scientists:


default search action
Matthew Wright 0001
Matthew K. Wright
Person information

- affiliation: Rochester Institute of Technology, NY, USA
- affiliation (former): University of Texas at Arlington, Department of Computer Science and Engineering
- affiliation (former): University of Massachusetts Amherst, Department of Computer Science
Other persons with the same name
- Matthew Wright (aka: Matt Wright) — disambiguation page
- Matthew Wright 0002 (aka: Matthew James Wright) — Stanford University, Center for Computer Research in Music and Acoustics, CA, USA (and 1 more)
- Matthew Wright 0003
— King's College London, Biomedical Engineering, UK
- Matthew Wright 0004 — University of Minnesota, USA
- Matthew Wright 0005
(aka: Matthew L. Wright) — St. Olaf College, Northfield, MN, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c61]Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses. SP 2023: 969-986 - 2022
- [j35]Mahdi Nasrullah Al-Ameen, Sonali Tukaram Marne, Kanis Fatema, Matthew Wright
, Shannon Scielzo:
On improving the memorability of system-assigned recognition-based passwords. Behav. Inf. Technol. 41(5): 1115-1131 (2022) - [c60]Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright:
On the Limitations of Continual Learning for Malware Classification. CoLLAs 2022: 564-582 - [c59]Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright
:
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. SP 2022: 1915-1932 - [c58]Shaikh Akib Shahriyar, Matthew K. Wright
:
Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation. WDC@AsiaCCS 2022: 13-18 - [i22]Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright
:
On the Limitations of Continual Learning for Malware Classification. CoRR abs/2208.06568 (2022) - 2021
- [j34]Sovantharith Seng
, Mahdi Nasrullah Al-Ameen, Matthew Wright
:
A first look into users' perceptions of facial recognition in the physical world. Comput. Secur. 105: 102227 (2021) - [j33]Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew Wright
:
A look into user privacy andthird-party applications in Facebook. Inf. Comput. Secur. 29(2): 283-313 (2021) - [j32]Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, Nicholas Hopper:
GANDaLF: GAN for Data-Limited Fingerprinting. Proc. Priv. Enhancing Technol. 2021(2): 305-322 (2021) - [j31]Mohammad Saidur Rahman
, Mohsen Imani, Nate Mathews, Matthew Wright
:
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces. IEEE Trans. Inf. Forensics Secur. 16: 1594-1609 (2021) - [c57]Xinmiao Lin, Wentao Bao, Matthew K. Wright, Yu Kong:
Gradient Frequency Modulation for Visually Explaining Video Understanding Models. BMVC 2021: 14 - [c56]Jayesh Doolani, Matthew Wright
, Rajesh Setty, S. M. Taiabul Haque:
LociMotion: Towards Learning a Strong Authentication Secret in a Single Session. CHI 2021: 689:1-689:13 - [c55]Jack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, Matthew Wright
:
What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning. WPES@CCS 2021: 237-243 - [i21]Xinmiao Lin, Wentao Bao, Matthew K. Wright, Yu Kong:
Gradient Frequency Modulation for Visually Explaining Video Understanding Models. CoRR abs/2111.01215 (2021) - 2020
- [j30]Akash Chintha
, Bao Thai
, Saniat Javid Sohrawardi
, Kartavya Bhatt
, Andrea Hickerson
, Matthew Wright
, Raymond W. Ptucha
:
Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection. IEEE J. Sel. Top. Signal Process. 14(5): 1024-1037 (2020) - [j29]Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright:
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. Proc. Priv. Enhancing Technol. 2020(3): 5-24 (2020) - [c54]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright
:
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. CCS 2020: 1497-1512 - [c53]Rayan Mosli, Matthew Wright
, Bo Yuan, Yin Pan:
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization. ESORICS (2) 2020: 439-459 - [c52]Akash Chintha, Aishwarya Rao, Saniat Javid Sohrawardi, Kartavya Bhatt, Matthew Wright
, Raymond W. Ptucha:
Leveraging edges and optical flow on faces for deepfake detection. IJCB 2020: 1-10 - [c51]Perry Deng, Cooper Linsky, Matthew Wright
:
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data. ISI 2020: 1-6 - [i20]Perry Deng, Cooper Linsky, Matthew Wright:
Weaponizing Unicodes with Deep Learning - Identifying Homoglyphs with Weakly Labeled Data. CoRR abs/2010.04382 (2020) - [i19]Perry Deng, Mohammad Saidur Rahman, Matthew Wright:
Detecting Adversarial Patches with Class Conditional Reconstruction Networks. CoRR abs/2011.05850 (2020)
2010 – 2019
- 2019
- [j28]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright
:
Modified relay selection and circuit selection for faster Tor. IET Commun. 13(17): 2723-2734 (2019) - [c50]Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright
:
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. CCS 2019: 1131-1148 - [c49]Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond W. Ptucha, Matthew Wright
:
Poster: Towards Robust Open-World Detection of Deepfakes. CCS 2019: 2613-2615 - [c48]Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, Matthew Wright
:
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study. CCS 2019: 2617-2619 - [c47]Nate Mathews, Mohammad Saidur Rahman, Matthew Wright
:
Poster: Evaluating Security Metrics for Website Fingerprinting. CCS 2019: 2625-2627 - [c46]Mohammad Saidur Rahman, Nate Mathews, Matthew Wright
:
Poster: Video Fingerprinting in Tor. CCS 2019: 2629-2631 - [i18]Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright:
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. CoRR abs/1902.06421 (2019) - [i17]Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Aneesh Yogesh Joshi, Matthew Wright:
Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. CoRR abs/1902.06626 (2019) - [i16]Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan:
They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization. CoRR abs/1909.07490 (2019) - 2018
- [j27]Mohsen Imani, Armon Barton, Matthew Wright:
Guard Sets in Tor using AS Relationships. Proc. Priv. Enhancing Technol. 2018(1): 145-165 (2018) - [c45]Payap Sirinam, Mohsen Imani, Marc Juarez
, Matthew Wright
:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. CCS 2018: 1928-1943 - [c44]Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright
:
Adversarial Traces for Website Fingerprinting Defense. CCS 2018: 2225-2227 - [c43]Armon Barton, Matthew Wright, Jiang Ming, Mohsen Imani:
Towards Predicting Efficient and Anonymous Tor Circuits. USENIX Security Symposium 2018: 429-444 - [i15]Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. CoRR abs/1801.02265 (2018) - [i14]Armon Barton, Mohsen Imani, Jiang Ming, Matthew Wright:
Towards Predicting Efficient and Anonymous Tor Circuits. CoRR abs/1805.01977 (2018) - 2017
- [j26]Jun-Won Ho
, Matthew K. Wright
:
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations. IEEE Access 5: 680-695 (2017) - [j25]Mahdi Nasrullah Al-Ameen, Matthew K. Wright
:
Exploring the Potential of GeoPass: A Geographic Location-Password Scheme. Interact. Comput. 29(4): 605-627 (2017) - [c42]John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright
:
LiLAC: Lightweight Low-Latency Anonymous Chat. PAC 2017: 141-151 - [c41]Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. SOUPS 2017 - [c40]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
Statistical Detection of Downloaders in Freenet. IWPE@SP 2017: 25-32 - [i13]Mohsen Imani, Armon Barton, Matthew Wright:
Forming Guard Sets using AS Relationships. CoRR abs/1706.05592 (2017) - [i12]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright:
The Evaluation of Circuit Selection Methods on Tor. CoRR abs/1706.06457 (2017) - 2016
- [j24]Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright
:
Leveraging autobiographical memory for two-factor online authentication. Inf. Comput. Secur. 24(4): 386-399 (2016) - [j23]Mahdi Nasrullah Al-Ameen, Matthew K. Wright
:
iPersea: Towards improving the Sybil-resilience of social DHT. J. Netw. Comput. Appl. 71: 1-10 (2016) - [j22]Armon Barton, Matthew Wright:
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications. Proc. Priv. Enhancing Technol. 2016(4): 356-372 (2016) - [c39]Omid Asudeh, Matthew Wright
:
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity. CCS 2016: 1790-1792 - [c38]Marc Juarez
, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright
:
Toward an Efficient Website Fingerprinting Defense. ESORICS (1) 2016: 27-46 - [c37]Miri Choi, Jaewon Jang, Yeeji Kwon, Subeen Lim, Jun-Won Ho, Matthew K. Wright:
Split-Pipeline Model for Worm Propagation over IoT. IOT 2016: 155-156 - [i11]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright:
Modified Relay Selection and Circuit Selection for Faster Tor. CoRR abs/1608.07343 (2016) - 2015
- [c36]Changchang Liu, Peng Gao, Matthew K. Wright
, Prateek Mittal:
Exploiting Temporal Dynamics in Sybil Defenses. CCS 2015: 805-816 - [c35]Mahdi Nasrullah Al-Ameen, Matthew K. Wright
, Shannon Scielzo
:
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. CHI 2015: 2315-2324 - [c34]Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright
, Shannon Scielzo
:
Leveraging Real-Life Facts to Make Random Passwords More Memorable. ESORICS (2) 2015: 438-455 - [c33]Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo:
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. SOUPS 2015: 185-196 - [i10]Mahdi Nasrullah Al-Ameen, Matthew K. Wright, Shannon Scielzo:
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. CoRR abs/1503.02314 (2015) - [i9]Marc Juarez, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright:
WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor. CoRR abs/1512.00524 (2015) - 2014
- [j21]Ying-Dar Lin, Chun-Ying Huang
, Matthew K. Wright
, Georgios Kambourakis:
Mobile Application Security. Computer 47(6): 21-23 (2014) - [j20]S. M. Taiabul Haque, Matthew K. Wright
, Shannon Scielzo
:
Hierarchy of users' web passwords: Perceptions, practices and susceptibilities. Int. J. Hum. Comput. Stud. 72(12): 860-874 (2014) - [j19]Mayank Raj
, Na Li, Donggang Liu, Matthew K. Wright
, Sajal K. Das
:
Using data mules to preserve source location privacy in Wireless Sensor Networks. Pervasive Mob. Comput. 11: 244-260 (2014) - [j18]Ruj Akavipat
, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright
:
ReDS: A Framework for Reputation-Enhanced DHTs. IEEE Trans. Parallel Distributed Syst. 25(2): 321-331 (2014) - [c32]Mahdi Nasrullah Al-Ameen, Matthew K. Wright
:
Design and evaluation of persea, a sybil-resistant DHT. AsiaCCS 2014: 75-86 - [c31]Jody Sankey, Matthew K. Wright
:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. Privacy Enhancing Technologies 2014: 283-303 - [c30]S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright:
Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. SOUPS 2014: 231-242 - [i8]Nabila Rahman, Matthew K. Wright, Donggang Liu:
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks. CoRR abs/1401.7002 (2014) - [i7]Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. CoRR abs/1405.0351 (2014) - [i6]Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright:
Q-A: Towards the Solution of Usability-Security Tension in User Authentication. CoRR abs/1407.7277 (2014) - [i5]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
A Comprehensive Study of the GeoPass User Authentication Scheme. CoRR abs/1408.2852 (2014) - [i4]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
iPersea : The Improved Persea with Sybil Detection Mechanism. CoRR abs/1412.6883 (2014) - 2013
- [j17]Kush Kothari, Matthew K. Wright
:
Mimic: An active covert channel that evades regularity-based detection. Comput. Networks 57(3): 647-657 (2013) - [j16]Qi Dong, Donggang Liu, Matthew K. Wright
:
Mitigating jamming attacks in wireless broadcast systems. Wirel. Networks 19(8): 1867-1880 (2013) - [c29]S. M. Taiabul Haque, Matthew K. Wright
, Shannon Scielzo
:
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets. SPSM@CCS 2013: 105-110 - [c28]Mahdi N. Al-Ameen, Matthew K. Wright
:
Persea: a sybil-resistant social DHT. CODASPY 2013: 169-172 - [c27]S. M. Taiabul Haque, Matthew K. Wright
, Shannon Scielzo
:
A study of user password strategy for multiple accounts. CODASPY 2013: 173-176 - [c26]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. NDSS 2013: 1-18 - [e2]Emiliano De Cristofaro, Matthew K. Wright:
Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Lecture Notes in Computer Science 7981, Springer 2013, ISBN 978-3-642-39076-0 [contents] - 2012
- [j15]Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Networks 10(3): 512-523 (2012) - [j14]Mahdi N. Al-Ameen, Charles Gatz, Matthew K. Wright
:
SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. J. Networks 7(12): 1943-1951 (2012) - [j13]Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Trans. Dependable Secur. Comput. 9(4): 494-511 (2012) - [j12]Kiran Mehta, Donggang Liu, Matthew K. Wright
:
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper. IEEE Trans. Mob. Comput. 11(2): 320-336 (2012) - [c25]Kartik Siddhabathula, Qi Dong, Donggang Liu, Matthew K. Wright
:
Fast jamming detection in sensor networks. ICC 2012: 934-938 - [c24]Na Li, Mayank Raj
, Donggang Liu, Matthew K. Wright
, Sajal K. Das
:
Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks. ICDCN 2012: 309-324 - [c23]Umair Sadiq, Mohan Kumar, Matthew K. Wright
:
CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks. MSWiM 2012: 69-78 - [e1]Simone Fischer-Hübner, Matthew K. Wright:
Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings. Lecture Notes in Computer Science 7384, Springer 2012, ISBN 978-3-642-31679-1 [contents] - [i3]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. CoRR abs/1208.6326 (2012) - [i2]Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. CoRR abs/1209.4867 (2012) - 2011
- [j11]Robert J. Walls, Kush Kothari, Matthew K. Wright
:
Liquid: A detection-resistant covert timing channel based on IPD shaping. Comput. Networks 55(6): 1217-1228 (2011) - [j10]Nayantara Mallesh, Matthew K. Wright
:
An analysis of the statistical disclosure attack and receiver-bound cover. Comput. Secur. 30(8): 597-612 (2011) - [j9]N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew K. Wright
:
Economic incentives for protecting digital rights online. Electron. Commer. Res. Appl. 10(5): 553-564 (2011) - [j8]Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright
:
Empirical tests of anonymous voice over IP. J. Netw. Comput. Appl. 34(1): 341-350 (2011) - [j7]Gauri Vakde, Radhika Bibikar, Zhengyi Le, Matthew K. Wright
:
EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Networks 4(11): 1243-1256 (2011) - [j6]Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Trans. Mob. Comput. 10(6): 767-782 (2011) - [c22]Nayantara Mallesh, Matthew K. Wright:
Poster: shaping network topology for privacy and performance. CCS 2011: 813-816 - [i1]Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew K. Wright:
#h00t: Censorship Resistant Microblogging. CoRR abs/1109.6874 (2011) - 2010
- [j5]Jaideep D. Padhye, Kush Kothari, Madhu Venkateshaiah, Matthew K. Wright
:
Evading stepping-stone detection under the cloak of streaming media with SNEAK. Comput. Networks 54(13): 2310-2325 (2010) - [j4]Safwan Mahmud Khan, Nayantara Mallesh, Arjun Nambiar, Matthew K. Wright:
The Dynamics of Salsa: A Robust Structured P2P System. Netw. Protoc. Algorithms 2(4): 40-60 (2010) - [c21]Pranav Krishnamoorthy, Matthew K. Wright
:
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. AISec 2010: 1-7 - [c20]Ruj Akavipat
, Apurv Dhadphale, Apu Kapadia, Matthew Wright
:
ReDS: reputation for directory services in P2P systems. Insider Threats@CCS 2010: 47-54 - [c19]Matthew K. Wright
, Apu Kapadia, Mohan Kumar, Apurv Dhadphale:
ReDS: reputation for directory services in P2P systems. CSIIRW 2010: 71 - [c18]Titus Abraham, Matthew K. Wright
:
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes. GLOBECOM 2010: 1-5 - [c17]Nayantara Mallesh, Matthew K. Wright
:
The Reverse Statistical Disclosure Attack. Information Hiding 2010: 221-234 - [c16]Brent Lagesse
, Mohan Kumar, Matthew K. Wright
:
ReSCo: A middleware component for Reliable Service Composition in pervasive systems. PerCom Workshops 2010: 486-491
2000 – 2009
- 2009
- [j3]Jun-Won Ho, Donggang Liu, Matthew K. Wright
, Sajal K. Das
:
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476-1488 (2009) - [c15]Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis. INFOCOM 2009: 1773-1781 - [c14]Jun-Won Ho, Donggang Liu, Matthew K. Wright
, Sajal K. Das
:
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. PerCom Workshops 2009: 1-6 - [c13]Brent Lagesse
, Mohan Kumar, Justin Mazzola Paluska, Matthew K. Wright
:
DTT: A Distributed Trust Toolkit for Pervasive Systems. PerCom 2009: 1-8 - [c12]Zhengyi Le, Gauri Vakde, Matthew K. Wright
:
PEON: privacy-enhanced opportunistic networks with applications in assistive environments. PETRA 2009 - [c11]Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis. SRDS 2009: 217-223 - 2008
- [j2]Matthew K. Wright
, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur. 11(2): 3:1-3:34 (2008) - [c10]Brent Lagesse
, Mohan Kumar, Matthew K. Wright
:
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems. Peer-to-Peer Computing 2008: 43-52 - [c9]Hatim Daginawala, Matthew K. Wright
:
Studying Timing Analysis on the Internet with SubRosa. Privacy Enhancing Technologies 2008: 133-150 - 2007
- [c8]Nayantara Mallesh, Matthew K. Wright:
Countering Statistical Disclosure with Receiver-Bound Cover Traffic. ESORICS 2007: 547-562 - [c7]Kiran Mehta, Donggang Liu, Matthew K. Wright
:
Location Privacy in Sensor Networks Against a Global Eavesdropper. ICNP 2007: 314-323 - 2006
- [c6]Arjun Nambiar, Matthew K. Wright
:
Salsa: a structured approach to large-scale anonymity. CCS 2006: 17-26 - 2005
- [c5]Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:
Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392 - 2004
- [j1]Matthew K. Wright
, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4): 489-522 (2004) - [c4]N. Boris Margolin, Matthew K. Wright, Brian Neil Levine:
Analysis of an incentives-based secrets protection system. Digital Rights Management Workshop 2004: 22-30 - [c3]Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 - 2003
- [c2]Matthew K. Wright
, Micah Adler, Brian Neil Levine, Clay Shields:
Defending Anonymous Communications Against Passive Logging Attack. S&P 2003: 28-41 - 2002
- [c1]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
An Analysis of the Degradation of Anonymous Protocols. NDSS 2002: 1-12
Coauthor Index
Mahdi N. Al-Ameen
aka: Mahdi Nasrullah Al-Ameen
aka: Mahdi Nasrullah Al-Ameen